A cloud-based migration system exposes a source-independent application programming interface for receiving data to be migrated. The data is uploaded and stored as a single entity in a cloud-based storage system. A migration system then accesses the migration package and begins migrating the data to its destination, from the cloud-based storage system.
|
1. A method performed by a computing system, the method comprising:
receiving a migration request including a manifest that identifies information, stored in a source data store of a source system, to be migrated to a destination system that is remote from the source system;
identifying a plurality of content objects, from the source data store of the source system, to be migrated to the destination system in a sequential order, based on object identifiers that identify the content objects in the manifest;
generating a migration log that is associated with the manifest and tracks a completion status of the migration of each of the content objects and stores a last-tracked content object identifier that identifies a last content object imported to the destination system; and
migrating the plurality of content objects to the destination system by storing each content object to a destination data store in the destination system, wherein migrating comprises:
ignoring all content objects identified in the sequential order prior to the last content object identified by the last-tracked content object identifier; and
writing a given identified object to the destination data store.
10. A computing system, comprising:
at least one processor; and
memory storing instructions executable by the at least one processor, wherein the instructions, when executed, cause the computing system to:
receive a migration request including a manifest that identifies information, stored in a source data store of a source system, to be migrated to a destination system that is remote from the source system;
identify a set of content objects, from the source data store of the source system, to be migrated to the destination system in a sequential order, based on object identifiers that identify the content objects in the manifest;
import the set of content objects to the destination system by
storing each content object to a destination data store in the destination system,
ignoring all content objects identified in the sequential order prior to a last content object identified by a last content object identifier, and
writing a given identified object to the destination store; and
generate a migration log that is associated with the manifest and stores:
status information indicative of a completion status of the migration of each content object of the set of content objects, and
error information identifying errors that occurred during the migration.
16. A computing system, comprising:
at least one processor; and
memory storing instructions executable by the at least one processor, wherein the instructions configure the computing system to provide:
a migration queue system configured to:
receive a migration request including a manifest that identifies information, stored in a source data store of a source system, to be migrated to a destination system that is remote from the source system;
a manifest accessing component configured to:
access the manifest to identify a set of content objects, from the source data store of the source system, to be migrated to the destination system;
an import component configured to:
import the set of content objects to the destination system by storing each content object to a destination data store in the destination system; and
generate a migration log that is associated with the manifest and identifies a completion status of the migration of each of the content objects,
wherein the manifest accessing component is configured to identify the content objects to be migrated, to the import component, in a sequential order, based on object identifiers that identify the content objects in the manifest; and
an overwrite/ignore controller configured to:
control the import component to ignore all content objects identified in the sequential order prior to a last content object identified by a last content object identifier; and
control the import component to write a given identified object to the destination store.
2. The method of
exposing a source-independent application programming interface that is invoked by the migration request.
3. The method of
queueing a work item corresponding to the migration request in a work item queue.
5. The method of
receiving all content objects to be migrated from the source system to the destination system;
storing the content objects to an intermediate storage system; and
importing the content objects from the intermediate storage system to the destination data store.
6. The method of
7. The method of
tracking, using the migration log, content objects that are imported to the destination system and, in response to detecting a migration failure, resuming migration from the last content object.
8. The method of
intermittently storing the last-tracked content object identifier, indicating the last content object imported to the destination system.
9. The method of
in response to detecting a migration failure, identifying content objects to be migrated from a beginning of the sequential order and ignoring all content objects identified in the sequential order prior to the last content object identified by the last-tracked content object identifier.
11. The computing system of
a number of virtual machines, controlled by the import component, to import the identified set of content objects;
wherein the instructions, when executed, configure the computing system to provide:
a bot thread controller configured to scale the number of virtual machines based on a number of work items in a work item queue.
12. The computing system of
the migration queue system is configured to receive a migration package, that includes the manifest, in association with the migration request, the manifest identifying the information to be migrated from the source system to the destination system, and
the migration log identifies a completion status of the migration of each of the content objects.
13. The computing system of
an intermediate storage system configured to receive, as part of the migration request from the source system, all content objects to be migrated from the source system to the destination system;
wherein the import component is configured to import the data from the intermediate storage to the destination data store.
14. The computing system of
a resumability system configured to track content objects that are imported to the destination system and, when a migration failure is detected, resume migration from a last-tracked content object.
15. The computing system of
17. The computing system of
a last object storage component configured to intermittently store the last content object identifier for a last content object identified by the manifest accessing component to be imported to the destination system.
18. The computing system of
19. The computing system of
when the manifest accessing component identifies the last content object to the import component, the overwrite/import controller is configured to control the import component to again begin writing the identified content objects to the destination system,
once the import component again begins writing the identified content objects to the destination system, the last object storage component is configured to store a content object identifier for each identified content object, as it is identified by the manifest accessing system, as the last content object identifier, and
the last object storage component is configured to store a content object identifier for each identified content object, as it is identified by the manifest accessing system, as the last content object identifier, for a resumability time period, after which the last object storage system resumes intermittently storing the last content object identifier for the content objects, as they are identified by the manifest accessing system.
|
The present application is a continuation of and claims priority of U.S. patent application Ser. No. 14/854,798, filed Sep. 15, 2015, which is based on and claims the benefit of U.S. provisional patent application Ser. No. 62/155,735, filed May 1, 2015, the contents of which is hereby incorporated by reference in their entirety.
Computing systems are currently in wide use. Some computing systems are local, in that they are used generally at a location where end users reside. Other computing systems are deployed in remote-server environments, such as in cloud computing architectures.
Some organizations use relatively large computing systems initially in an on-premise, or local architecture. However, it may be that such organizations wish to migrate data and other components of the computing system (either the entire on-premise computing system, or parts of it) to a remote server environment, such as to a cloud computing architecture.
The content to be migrated to the cloud can originate from various sources, and have different forms. Some migration systems in the cloud expose an application programming interface (or API) that is called, with content, for migration. In current systems, an API call needs to be made for each object to be migrated, and for each version or source.
Cloud migration systems also often serve a number of different organizations. When an organization is attempting to migrate a relatively large amount of data to the cloud, this can adversely affect the performance provided to other organizations. For instance, the data ingestion rate of the cloud migration system may be limited, so that when one organization makes a relatively large migration call, this can slow down the performance of the system for other organizations.
Further, data to be migrated is often loaded directly into the migration system. By way of example, a set of on-premise migration content can be generated, that may be relatively large. That set of content is then often uploaded directly into the migration system in the cloud. If the migration of any item of that particular set of content fails, then the entire set of content needs to be re-uploaded to the cloud-based migration system, from the on-premise system.
The discussion above is merely provided for general background information and is not intended to be used as an aid in determining the scope of the claimed subject matter.
A cloud-based migration system exposes a source-independent application programming interface for receiving data to be migrated. The data is uploaded and stored as a single entity in a cloud-based storage system. A migration system then accesses the migration package and begins migrating the data to its destination, from the cloud-based storage system.
This Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used as an aid in determining the scope of the claimed subject matter. The claimed subject matter is not limited to implementations that solve any or all disadvantages noted in the background.
On-premise system 106 illustratively includes a set of content sources 116. For instance, they can include a file share system 118, document management system 120, personal file data store 122, or a variety of other sources 124. On-premise system 106 also illustratively includes migration package creation system 126 (which, itself, illustratively includes initial package generator 128 and incremental package generator 130), package upload component 132, a set of processors or servers 134, user interface component 136, and it can include other items 138. In order to migrate data from content sources 116 to content destination sites 108, an administrator first uses migration package creation system 126 to create a migration package 140. It then uses package upload component 132 to upload migration package 140, through a source-independent application programming interface (or API) 142, exposed by content migration system 104. In one example, migration package 140 includes content 144 that has not only content, but a set of read keys 146, a manifest 148 that has a listing or other records of the items of content 144 that are to be migrated, along with a set of read/write keys 150. As is described in greater detail below, content migration system 104 also illustratively places a set of completed logs 152 in migration package 140 (and it can be within manifest 148). Logs 152 identify the completion status of the migration of various objects identified in manifest 148 to the content destination sites 108. It can also include any errors 154 that occurred during the migration. Migration package 140 can include other items 156 as well.
In the example shown in
Content migration system 104 can also illustratively include migration component 164 that has a migration queue system 166 that manages various queues during migration, a permissions mapping system 168 that maps permissions from entities in on-premise system 106 to those same entities in content destination sites 108. Component 164 can include a resource scale system 170 that scales the various resources (e.g., virtual machines and storage) used by migration component 164, based upon the workload of items to be migrated in intermediate storage system 158. Component 164 can also include a resumability system 172 that performs resumability processing so that, if a migration job fails in mid-course, it need not begin again from the first object to be migrated, but can skip all or some of the objects that have were successfully migrated, before the job failed. Component 164 can of course include other items 174 as well.
Content destination sites 108 can include a set of sites 176-180. Each site illustratively includes a site identifier 182, 184 and 186, respectively, as well as a web identifier 190, 192 and 194, respectively. Each site also illustratively includes its own destination store 196, 198 and 200.
Keys 278 illustratively allow the migration system to only read the content, but to read and write to the manifest. This is so that the system can write import status updates, errors, etc., to the manifest so that the administrator who initiated the migration can check on the status.
Package upload component 132 then uploads the migration package (or packages) to the cloud-based intermediate storage system 158. This is indicated by block 282. It can do this by making a single call to the source-independent API 142, and including the various migration packages. This is indicated by block 284. Storage component 162 then stores the package, as a blob, in blob store 160. The upload can be performed in other ways as well, and this is indicated by block 286. Work item queue generator 220 (
Bot/thread component 230 then selects a job 222-224 from the work item queue 226. This is indicated by block 292.
Manifest accessing component 232 reads the manifest to identify a first (or next) content object to be imported. Import component 234 then imports that content object to the destination site 108. Component 230 then places a log in the corresponding manifest and updates the log as the import completes. This is indicated by block 294. As is described below with respect to
Also, in one example, the migration may be performed incrementally. This is described in greater detail below with respect to
Once the objects identified in the manifest have all been imported (or migrated) to their destination sites, bot/thread control component 230 determines whether there are any more jobs in work item queue 226. This is indicated by block 302. If so, processing reverts to block 292 where another job is selected and import begins again for that job.
Last object storage component 252 then accesses the manifest to identify a next object that is to be imported by the import component 234 for this migration job. The identifier of that object is set to a current object ID (which indicates the current object being imported). This is indicated by block 318.
In one example, resumability timer component 250 is set so that resumability processing is performed periodically, based upon the time value of the timer. By way of example, timer component 250 may be set to perform resumability processing once every minute. In that case, each minute, component 252 stores the ID of the current object being imported, so if the migration fails, the system will know, to within a minute (or other interval of timer 250), which objects have already been imported to the destination site. Therefore, if, as indicated at block 320, it is time to perform resumability processing, then last object storage component 252 updates the last object ID 254 in data store 256 to the current object ID. This is indicated by block 322. Import component 234 continues to import the current object.
If the import of the current object completes successfully, as indicated by block 324, then control component 230 logs the completion in the corresponding manifest. This is indicated by block 326. Manifest accessing component 232 then determines whether there are more objects in the manifest to import. This is indicated by block 328. If so, processing reverts to block 318 where the next object to import is identified, etc.
If, at block 324, it is determined that the job has aborted or somehow failed, so that import of the current object was not completed successfully, then retry count storage component 258 determines whether a total retry count threshold has been reached for either the current object, or the current job. This is indicated by block 330. If so, the job is deleted from the work item queue 226, as indicated by block 332, and an appropriate alert is sent to the administrator that requested the migration, as indicated by block 334.
However, if, at block 330, it is determined that the total retry count threshold has not been met (either for the job or for this object), then the retry counters are both incremented (both for this job and for the current object). This is indicated by block 336. Next, manifest accessing component 232 determines whether the manifest being processed is the most recent manifest (i.e., whether the manifest data 264 corresponds to the manifest currently being processed. This is indicated by block 338. If not, this would indicate that the job is trying to process a different manifest than resumability system 172 is tracking. Thus, the job is again deleted from the queue as indicated by block 332, and an appropriate notification or alert is sent, as indicated by block 334.
If, at block 338, it is determined that the manifest identified by resumability system 172 is the same manifest as that which is being operated on, then the overwrite/ignore controller 236 is set to “ignore”. This is indicated by block 340. When the overwrite/ignore controller 236 is set to “overwrite”, this means that when an object is selected for being imported, it is re-imported, in its entirety, so that it overwrites the previous object in the destination site to which it is being migrated. However, if it is set to “ignore”, then the controller simply verifies that the object being operated on exists in the destination site, and it is not re-imported.
Resumability system 172 also sets the resumability timer component 250 so that resumability processing will be performed for every object that is imported. For instance, it may be that multiple objects were imported during the previous one minute interval set by the resumability timer component 250. Therefore, if the job failed during that interval, it is not known which particular object caused the failure. The resumability frequency is set to update with every object imported. This will enable the system to identify the precise object that caused the job failure, if it should fail again.
An example may be helpful. Assume that when a job runs, the system tries to import files 10-20 during a one minute interval, but the system crashes when it is attempting to import file 19. In that case, last object storage component 252 would only have recorded file 10 as the last object updated, since it only records that every minute. It would not know that the migration actually crashed on file 19. During the retry, the resumability frequency is set to happen with each object. Therefore, last object storage component will update the last object identifier 254 every time a new object is selected for import. If the migration crashes again on file 19, this will enable the system to precisely identify that file 19 was the file that was being processed when the system crashed. Setting the resumability frequency to happen with each object is indicated by block 342 in
During the retry, all objects from the beginning of the manifest to the last object ID are processed with the overwrite/ignore controller 236 set to ignore. Thus, these objects will all be processed without re-importing any of them. This is because it is known that their import was successfully completed. This is indicated by block 346. When the last object ID that was recorded before the failure is reached in the manifest, the overwrite/ignore controller 236 is then set to “overwrite”. This causes import component 234 to begin importing the object that has that object ID, in its entirety, overwriting the destination site. This is indicated by block 348.
Importing objects according to the manifest then continues as usual, performing resumability processing after every imported object, until the resumability time window has passed. Then, the resumability frequency is reset to occur on the timer interval. This is indicated by block 350.
Again, an example may be helpful. If, during the initial migration, the system attempted to import 10 files (files 10-20) during the one minute resumability timer interval, but the system crashed on file 19, then the system starts to re-import files, in their entirety, from the beginning of that timer interval (with file 10). It also updates the last object ID, with each file that is successfully migrated. However, after the timer interval has expired (e.g., after one minute), then this means that the file where the system crashed previously (file 19) has already been imported successfully. Therefore, the resumability timer can then be reset to perform resumability processing every minute, instead of after each object. In this way, any potentially bad object that resides within the last one minute interval (and corresponds to the previous crash) can be identified quickly if it continues to cause a failure, but the resumability processing need not occur so frequently, once that file has been successfully imported.
Processing then reverts back to block 318 where the manifest is accessed to identify a next object to import, and importing proceeds, as normal.
Without any way of performing incremental migration, this second migration would also take several weeks. Therefore, there would potentially be no way to reach the final synchronized state between the on-premise sources 116 and the content destination sites 108, unless the organization is willing to have a relatively long down-time.
According to another scenario, it may be that the organization initiated a migration job with thousands of different files. The initial migration may have encountered unexpected failures for a fraction of those files, due to a packaging mistake made at the on-premise system. The organization may wish to retry migrating those files. Without incremental migration, the organization would need to resubmit the whole migration from scratch, or to craft a special manifest (or migration package) for only those files that failed. In accordance with one example, incremental package generator 130 automatically detects the differences between the data that was successfully migrated, and any changes to that data. This is described in greater detail with respect to
It is first assumed that an initial migration package has been generated for each one of the content sources 116. This is indicated by block 410 in
During the initial migration, end users continue to work on (and make changes to) the sources 116 being migrated. This is indicated by block 422.
When the initial migration is complete (or otherwise intermittently) the administrator illustratively uses incremental package generator 130 to generate a differential (or incremental) migration package. This is indicated by block 424. The differential migration package illustratively includes a flag identifying it as such. This is indicated by block 426.
It illustratively accesses and verifies the commit logs as indicated by block 428. For instance, it can find and download all commit logs that include the identity of the source and destination. It can read the commit logs, one by one, and merge the content to make sure all the objects are unique.
It can then identify any new files or folders and add them to the manifest. This is indicated by block 430. For instance, it can enumerate the source file location to generate the differential manifest files. If the file or folder doesn't exist in original manifest, that means it is a new file or folder and it is added to the differential manifest. This is done by new source identifier 390.
Differential content identifier 392 also identifies whether existing files or folders have been modified, or have different content from those originally migrated, and it adds these files or folders (or other items of content) to the manifest as well. This is indicated by block 432. For instance, if the file or folder maps to the initial manifest, this means that it already existed at the time of the initial migration. However, if it has a newer last modified date identifier, this means that it has been modified since it was added to the initial manifest. Thus, it is added to the differential manifest. The differential migration package can be generated in other ways as well. This is indicated by block 434.
Package upload component 132 then uploads the differential migration package to run the incremental migration. This is indicated by block 436. This process continues, with the manifest and the differential data package becoming shorter and shorter, as incremental migrations are performed. Thus, the migration times will also become shorter and shorter, because fewer items of content need to be migrated. Thus, because this time is shorter, then end users will make fewer changes so the next differential migration will be shorter yet. This process continues until the time to complete the next incremental migration is sufficiently short that the administrator can place the content sources 116 in read only mode. This is indicated by block 438. At that point, a final incremental migration can be performed so that the content destination sites 108 are synchronized with the content sources 116, and the migration is complete. This is indicated by block 440.
The present system thus advantageously exposes an API that is independent of source. Therefore, migration packages can be generated according to that API regardless of the source of the data to be migrated. The migration package is then uploaded to intermediate storage on the cloud, so that internal cloud communication can be used to perform the ultimate migration. This increases the speed of the migration process. There is only a single (or very few) API call to initiate the migration and send the content to the cloud. Thus, repeated calls for each individual object, between the on-premise system and the cloud-based migration system, need not be made. This decreases network traffic and processing and memory overhead as well. The resumability system detects when an issue occurs and resumes where it stopped, instead of having to resubmit the entire job. In addition, because the intermediate, cloud-based storage system is used, the migration can be performed, in its final destination, without the need for customer initial storage to ever be needed. Access control specifications, per content item, are advantageously mapped between the source and target environments. Also the target environment can scale its resources based on the size of a given migration job. Export of content can also be done through the present system, allowing for archival, backup, or even analysis of content metadata.
The present discussion has mentioned processors and servers. In one embodiment, the processors and servers include computer processors with associated memory and timing circuitry, not separately shown. They are functional parts of the systems or devices to which they belong and are activated by, and facilitate the functionality of the other components or items in those systems.
Also, a number of user interface displays have been discussed. They can take a wide variety of different forms and can have a wide variety of different user actuatable input mechanisms disposed thereon. For instance, the user actuatable input mechanisms can be text boxes, check boxes, icons, links, drop-down menus, search boxes, etc. They can also be actuated in a wide variety of different ways. For instance, they can be actuated using a point and click device (such as a track ball or mouse). They can be actuated using hardware buttons, switches, a joystick or keyboard, thumb switches or thumb pads, etc. They can also be actuated using a virtual keyboard or other virtual actuators. In addition, where the screen on which they are displayed is a touch sensitive screen, they can be actuated using touch gestures. Also, where the device that displays them has speech recognition components, they can be actuated using speech commands.
A number of data stores have also been discussed. It will be noted they can each be broken into multiple data stores. All can be local to the systems accessing them, all can be remote, or some can be local while others are remote. All of these configurations are contemplated herein.
Also, the figures show a number of blocks with functionality ascribed to each block. It will be noted that fewer blocks can be used so the functionality is performed by fewer components. Also, more blocks can be used with the functionality distributed among more components.
The description is intended to include both public cloud computing and private cloud computing. Cloud computing (both public and private) provides substantially seamless pooling of resources, as well as a reduced need to manage and configure underlying hardware infrastructure.
A public cloud is managed by a vendor and typically supports multiple consumers using the same infrastructure. Also, a public cloud, as opposed to a private cloud, can free up the end users from managing the hardware. A private cloud may be managed by the organization itself and the infrastructure is typically not shared with other organizations. The organization still maintains the hardware to some extent, such as installations and repairs, etc.
A plurality of different client systems 251-253 (which can be end user systems or administrator systems, or both) can illustratively access cloud 102 over a network 255. Depending upon the type of service being used by each of the client systems 251-253, cloud 101 may provide different levels of service. In one example, the users of the different client systems are provided access to application software and databases. The cloud service then manages the infrastructure and platforms that run the application. This can be referred to as software as a service (or SaaS). The software providers operate application software in application layer 237 and end users access the software through the different client systems 251-253.
The cloud provider can also use platform layer 233 to provide a platform as a service (PaaS). This involves an operating system, programming language execution environment, database and webserver being provided to the client systems 251-253, as a service, from the cloud provider. Application developers then normally develop and run software applications on that cloud platform and the cloud provider manages the underlying hardware and infrastructure and software layers.
The cloud provider can also use infrastructure layer 235 to provide infrastructure as a service (IaaS). In such a service, physical or virtual machines and other resources are provided by the cloud provider, as a service. These resources are provided, on-demand, by the IaaS cloud provider, from large pools installed in data centers. In order to deploy applications, the cloud users that use IaaS install operating-system images and application software on the cloud infrastructure.
It will also be noted that architecture 100, or portions of it, can be disposed on a wide variety of different devices. Some of those devices include servers, desktop computers, laptop computers, tablet computers, or other mobile devices, such as palm top computers, cell phones, smart phones, multimedia players, personal digital assistants, etc.
In other examples, applications or systems are received on a removable Secure Digital (SD) card that is connected to a SD card interface 15. SD card interface 15 and communication links 13 communicate with a processor 17 (which can also embody processors from
I/O components 23, in one embodiment, are provided to facilitate input and output operations. I/O components 23 for various embodiments of the device 16 can include input components such as buttons, touch sensors, multi-touch sensors, optical or video sensors, voice sensors, touch screens, proximity sensors, microphones, tilt sensors, and gravity switches and output components such as a display device, a speaker, and or a printer port. Other I/O components 23 can be used as well.
Clock 25 illustratively comprises a real time clock component that outputs a time and date. It can also, illustratively, provide timing functions for processor 17.
Location system 27 illustratively includes a component that outputs a current geographical location of device 16. This can include, for instance, a global positioning system (GPS) receiver, a LORAN system, a dead reckoning system, a cellular triangulation system, or other positioning system. It can also include, for example, mapping software or navigation software that generates desired maps, navigation routes and other geographic functions.
Memory 21 stores operating system 29, network settings 31, applications 33, application configuration settings 35, data store 37, communication drivers 39, and communication configuration settings 41. Memory 21 can include all types of tangible volatile and non-volatile computer-readable memory devices. It can also include computer storage media (described below). Memory 21 stores computer readable instructions that, when executed by processor 17, cause the processor to perform computer-implemented steps or functions according to the instructions. Similarly, device 16 can have a client system 24 which can run various business applications or embody parts or all of architecture 100. Processor 17 can be activated by other components to facilitate their functionality as well.
Examples of the network settings 31 include things such as proxy information, Internet connection information, and mappings. Application configuration settings 35 include settings that tailor the application for a specific enterprise or user. Communication configuration settings 41 provide parameters for communicating with other computers and include items such as GPRS parameters, SMS parameters, connection user names and passwords.
Applications 33 can be applications that have previously been stored on the device 16 or applications that are installed during use, although these can be part of operating system 29, or hosted external to device 16, as well.
Additional examples of devices 16 that can be used as well. The device can be a feature phone, smart phone or mobile phone. The phone can include a set of keypads for dialing phone numbers, a display capable of displaying images including application images, icons, web pages, photographs, and video, and control buttons for selecting items shown on the display. The phone can include an antenna for receiving cellular phone signals such as General Packet Radio Service (GPRS) and 1×rtt, and Short Message Service (SMS) signals. In some embodiments, the phone also includes a Secure Digital (SD) card slot that accepts a SD card.
The mobile device can also be a personal digital assistant or a multimedia player or a tablet computing device, etc. (hereinafter referred to as a PDA). The PDA can include an inductive screen that senses the position of a stylus (or other pointers, such as a user's finger) when the stylus is positioned over the screen. This allows the user to select, highlight, and move items on the screen as well as draw and write. The PDA can also include a number of user input keys or buttons which allow the user to scroll through menu options or other display options which are displayed on the display, and allow the user to change applications or select user input functions, without contacting the display. Although not shown, the PDA can include an internal antenna and an infrared transmitter/receiver that allow for wireless communication with other computers as well as connection ports that allow for hardware connections to other computing devices. Such hardware connections are typically made through a cradle that connects to the other computer through a serial or USB port. As such, these connections are non-network connections.
Note that other forms of the devices 16 are possible.
Computer 810 typically includes a variety of computer readable media. Computer readable media can be any available media that can be accessed by computer 810 and includes both volatile and nonvolatile media, removable and non-removable media. By way of example, and not limitation, computer readable media may comprise computer storage media and communication media. Computer storage media is different from, and does not include, a modulated data signal or carrier wave. It includes hardware storage media including both volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by computer 810. Communication media typically embodies computer readable instructions, data structures, program modules or other data in a transport mechanism and includes any information delivery media. The term “modulated data signal” means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media includes wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared and other wireless media. Combinations of any of the above should also be included within the scope of computer readable media.
The system memory 830 includes computer storage media in the form of volatile and/or nonvolatile memory such as read only memory (ROM) 831 and random access memory (RAM) 832. A basic input/output system 833 (BIOS), containing the basic routines that help to transfer information between elements within computer 810, such as during start-up, is typically stored in ROM 831. RAM 832 typically contains data and/or program modules that are immediately accessible to and/or presently being operated on by processing unit 820. By way of example, and not limitation,
The computer 810 may also include other removable/non-removable volatile/nonvolatile computer storage media. By way of example only,
Alternatively, or in addition, the functionality described herein can be performed, at least in part, by one or more hardware logic components. For example, and without limitation, illustrative types of hardware logic components that can be used include Field-programmable Gate Arrays (FPGAs), Program-specific Integrated Circuits (ASICs), Program-specific Standard Products (ASSPs), System-on-a-chip systems (SOCs), Complex Programmable Logic Devices (CPLDs), etc.
The drives and their associated computer storage media discussed above and illustrated in
A user may enter commands and information into the computer 810 through input devices such as a keyboard 862, a microphone 863, and a pointing device 861, such as a mouse, trackball or touch pad. Other input devices (not shown) may include a joystick, game pad, satellite dish, scanner, or the like. These and other input devices are often connected to the processing unit 820 through a user input interface 860 that is coupled to the system bus, but may be connected by other interface and bus structures, such as a parallel port, game port or a universal serial bus (USB). A visual display 891 or other type of display device is also connected to the system bus 821 via an interface, such as a video interface 890. In addition to the monitor, computers may also include other peripheral output devices such as speakers 897 and printer 896, which may be connected through an output peripheral interface 895.
The computer 810 is operated in a networked environment using logical connections to one or more remote computers, such as a remote computer 880. The remote computer 880 may be a personal computer, a hand-held device, a server, a router, a network PC, a peer device or other common network node, and typically includes many or all of the elements described above relative to the computer 810. The logical connections depicted in
When used in a LAN networking environment, the computer 810 is connected to the LAN 871 through a network interface or adapter 870. When used in a WAN networking environment, the computer 810 typically includes a modem 872 or other means for establishing communications over the WAN 873, such as the Internet. The modem 872, which may be internal or external, may be connected to the system bus 821 via the user input interface 860, or other appropriate mechanism. In a networked environment, program modules depicted relative to the computer 810, or portions thereof, may be stored in the remote memory storage device. By way of example, and not limitation,
It should also be noted that the different embodiments described herein can be combined in different ways. That is, parts of one or more embodiments can be combined with parts of one or more other embodiments. All of this is contemplated herein.
Example 1 is a computing system, comprising:
a migration queue system that exposes a source-independent application programming interface that is invoked by a migration request to migrate information from a source system to a destination system and that queues a work item corresponding to the migration request in a work item queue;
a manifest accessing component that accesses a manifest of the information to be migrated to identify content objects to be migrated; and
an import component that imports the identified content objects to be migrated to the destination system, the manifest accessing component placing a migration log in the manifest and updating the migration log to indicate content objects that are imported to the destination system.
Example 2 is the computing system of any or all previous examples and further comprising:
a number of virtual machines, controlled by the import component, to import the identified content objects.
Example 3 is the computing system of any or all previous examples and further comprising:
a bot thread controller that scales the number of virtual machines based on a number of work items in the work item queue.
Example 4 is the computing system of any or all previous examples and further comprising:
an intermediate storage system that receives, as part of the migration request from the source system, all content objects to be migrated from the source system to the destination system.
Example 5 is the computing system of any or all previous examples wherein the destination system comprises a cloud-based destination system and wherein the intermediate storage system comprises:
a cloud-based, binary large object (blob) store that stores the content objects as a binary large object.
Example 6 is the computing system of any or all previous examples and further comprising:
a resumability system that tracks content objects that are imported to the destination system and, when a migration failure is detected, resumes migration from a last-tracked content object.
Example 7 is the computing system of any or all previous examples wherein the manifest accessing component identifies the content objects to be migrated, to the import component, in a sequential order, based on object identifiers that identify the content objects in the manifest.
Example 8 is the computing system of any or all previous examples and further comprising:
an overwrite/ignore controller that controls the import component write a given identified object to the destination store, or to ignore the given identified object.
Example 9 is the computing system of any or all previous examples wherein the resumability system comprises:
a last object storage component that intermittently stores a last content object identifier for a last content object identified by the manifest accessing to be imported to the destination system.
Example 10 is the computing system of any or all previous examples wherein, when a migration failure is detected, manifest accessing component begins identifying the content objects to be migrated from a beginning of the sequential order and wherein the overwrite/ignore controller controls the import component to ignore all content objects identified in the sequential order prior to the last content object identified by the last content object identifier.
Example 11 is the computing system of any or all previous examples wherein, when the manifest accessing component identifies the last content object to the import component, the overwrite/import controller controls the import component to again begin writing the identified content objects to the destination system.
Example 12 is the computing system of any or all previous examples wherein, once the import component again begins writing the identified content objects to the destination system, the last object storage component stores a content object identifier for each identified content object, as it is identified by the manifest accessing system, as the last content object identifier.
Example 13 is the computing system of any or all previous examples wherein the last object storage component stores a content object identifier for each identified content object, as it is identified by the manifest accessing system, as the last content object identifier, for a resumability time period, after which the last object storage system resumes intermittently storing the last content object identifier for the content objects, as they are identified by the manifest accessing system.
Example 14 is a computing system, comprising:
a migration package creation system that generates a migration package, in a source-independent structure, for a source of content objects to be migrated from a source system to a destination system by writing the content objects to the source-independent structure and by writing a manifest, that includes object identifiers for the content objects, to the source-independent structure; and
a package upload component that calls a source-independent application programming interface on a cloud-based content migration system to upload the migration package to a cloud-based intermediate storage system.
Example 15 is the computing system of any or all previous examples wherein the migration package creation system comprises:
a metadata logging component that writes object metadata for the content objects to a commit log, the object metadata identifying a last time the content objects were written to the migration package.
Example 16 is the computing system of any or all previous examples wherein the migration package creation system comprises:
a new source identifier that identifies new content objects as objects that are added to the source system since the last time the content objects were written to the migration package; and
a differential content identifier that identifies differential content as changes to the content objects made since the last time the content objects were written to the migration package.
Example 17 is the computing system of any or all previous examples wherein the migration package creation system comprises:
an incremental package generator that generates an incremental migration package with the new content objects and the differential content.
Example 18 is the computing system of any or all previous examples wherein the incremental package generator comprises:
an incremental manifest generator that generates an incremental manifest of the new content objects and the differential content and writes the incremental manifest to the incremental migration package.
Example 19 is a computer implemented method, comprising:
exposing a source-independent application programming interface that is invoked by a migration request to migrate information from a source system to a destination system;
queueing a work item corresponding to the migration request in a work item queue;
accessing a manifest of the information to be migrated;
identifying content objects to be migrated, from the manifest;
importing the identified content objects to be migrated to the destination system;
placing a migration log in the manifest; and
updating the migration log to indicate content objects that are imported to the destination system.
Example 20 is the computer-implemented method of any or all previous examples and further comprising:
intermittently storing a last content object identifier identifying a last identified migrated;
when a migration failure is detected, begin identifying the content objects to be migrated from a beginning of a sequential order in the manifest;
ignoring all content objects identified in the sequential order prior to the last content object identified by the last content object identifier; and
when the last content object is identified, again begin writing the identified content objects to the destination system.
Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are disclosed as example forms of implementing the claims.
Lin, Yu-Ting, Yap, Joe Keng, Thangaraju, Mahadevan, Livingston, Sean L., Cannerozzi, Roberta, Moussa, Ghania, Estrin, Ron Shimon, Bourdages, Simon, Nguyen, Trung Duc, Cai, Wenyu, Koehne, Zachary Adam, Simek, Patrick J., Gulati, Sukhvinder Singh, Canning, Ben
Patent | Priority | Assignee | Title |
Patent | Priority | Assignee | Title |
9411819, | Jun 27 2012 | EMC IP HOLDING COMPANY LLC | Federated namespace management |
9715502, | Mar 25 2015 | Amazon Technologies, Inc | Distributed data migration using chunking |
9753802, | Mar 30 2015 | Amazon Technologies, Inc | Dead letter queue for smart fleet management |
9866635, | Mar 26 2014 | Rockwell Automation Technologies, Inc. | Unified data ingestion adapter for migration of industrial data to a cloud platform |
20090310767, | |||
20120131173, | |||
20150019478, | |||
20150234670, | |||
20150261842, | |||
20150264128, | |||
20160212202, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Sep 04 2015 | GULATI, SUKHVINDER SINGH | Microsoft Technology Licensing, LLC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 048020 | /0669 | |
Sep 08 2015 | NGUYEN, TRUNG DUC | Microsoft Technology Licensing, LLC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 048020 | /0669 | |
Sep 08 2015 | CAI, WENYU | Microsoft Technology Licensing, LLC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 048020 | /0669 | |
Sep 08 2015 | KOEHNE, ZACHARY ADAM | Microsoft Technology Licensing, LLC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 048020 | /0669 | |
Sep 08 2015 | MOUSSA, GHANIA | Microsoft Technology Licensing, LLC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 048020 | /0669 | |
Sep 08 2015 | THANGARAJU, MAHADEVAN | Microsoft Technology Licensing, LLC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 048020 | /0669 | |
Sep 09 2015 | SIMEK, PATRICK J | Microsoft Technology Licensing, LLC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 048020 | /0669 | |
Sep 09 2015 | LIVINGSTON, SEAN L | Microsoft Technology Licensing, LLC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 048020 | /0669 | |
Sep 14 2015 | ESTRIN, RON SHIMON | Microsoft Technology Licensing, LLC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 048020 | /0669 | |
Sep 15 2015 | CANNING, BEN | Microsoft Technology Licensing, LLC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 048020 | /0669 | |
Sep 15 2015 | BOURDAGES, SIMON | Microsoft Technology Licensing, LLC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 048020 | /0669 | |
Sep 15 2015 | LIN, YU-TING | Microsoft Technology Licensing, LLC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 048020 | /0669 | |
Sep 15 2015 | CANNEROZZI, ROBERTA | Microsoft Technology Licensing, LLC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 048020 | /0669 | |
Sep 15 2015 | YAP, JOE KENG | Microsoft Technology Licensing, LLC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 048020 | /0669 | |
Jan 07 2019 | Microsoft Technology Licensing, LLC | (assignment on the face of the patent) | / |
Date | Maintenance Fee Events |
Jan 07 2019 | BIG: Entity status set to Undiscounted (note the period is included in the code). |
Apr 18 2024 | M1551: Payment of Maintenance Fee, 4th Year, Large Entity. |
Date | Maintenance Schedule |
Nov 24 2023 | 4 years fee payment window open |
May 24 2024 | 6 months grace period start (w surcharge) |
Nov 24 2024 | patent expiry (for year 4) |
Nov 24 2026 | 2 years to revive unintentionally abandoned end. (for year 4) |
Nov 24 2027 | 8 years fee payment window open |
May 24 2028 | 6 months grace period start (w surcharge) |
Nov 24 2028 | patent expiry (for year 8) |
Nov 24 2030 | 2 years to revive unintentionally abandoned end. (for year 8) |
Nov 24 2031 | 12 years fee payment window open |
May 24 2032 | 6 months grace period start (w surcharge) |
Nov 24 2032 | patent expiry (for year 12) |
Nov 24 2034 | 2 years to revive unintentionally abandoned end. (for year 12) |